7 Hits in 4.2 sec

Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm [chapter]

Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
2019 Lecture Notes in Computer Science  
We obtain improved quantum-time/classical-data tradeoffs with respect to the current literature, while using only as much hardware requirements (quantum and classical) as a standard exhaustive search with  ...  We manage to leverage the algebraic structure of cryptosystems in the context of a quantum attacker limited to classical queries and offline quantum computations.  ...  The problem has many cryptographic applications, and it will be at the core of our improved Q2 and Q1 time-memory-data tradeoffs. Problem 3 (Asymmetric Search of a Period).  ... 
doi:10.1007/978-3-030-34578-5_20 fatcat:lznl6couvve7voow33fc3freo4

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256

Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya
2021 IACR Transactions on Symmetric Cryptology  
We also present a quantum free-start collision attack on HCF-AES-256 with a time complexity of 286.07 which outperforms Chailloux, Naya-Plasencia, and Schrottenloher's generic quantum collision attack  ...  (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.  ...  Kai-Min Chung for initial discussions on quantum computing which led to the initiation of this work.  ... 
doi:10.46586/tosc.v2021.i1.316-336 fatcat:noxbr4ogc5bqvdbplkc2e2kwby

PudgyTurtle: Using Keystream to Encode and Encrypt

David A. August, Anne C. Smith
2020 SN Computer Science  
However, with this cost comes a benefit: PudgyTurtle resists time-memory tradeoff attacks better than standard stream encryption.  ...  Acknowledgements The authors acknowledge Albert Mao, MD, PhD for valuable comments regarding side-channel attacks, semantic security, and efficiency issues, and Peter Smith, Emeritus Professor, Keele University  ...  The BS time-memory-data tradeoff can now be appreciated in more detail.  ... 
doi:10.1007/s42979-020-00221-z fatcat:hltlrxyavnc5hko4lvkcuhaftm

An overview of cryptographic primitives for possible use in 5G and beyond

Jing Yang, Thomas Johansson
2020 Science China Information Sciences  
It also discusses the need for lightweight algorithms to meet the new use cases as well as the general demand for algorithms secure even when large quantum computers are available.  ...  tradeoff attack [58] .  ...  relatively occupy larger implementation area than block ciphers owing to the common rule that the internal state size of a stream cipher should be at least twice the security parameter to resist against the time-memory-data  ... 
doi:10.1007/s11432-019-2907-4 fatcat:bdapglaflnc75mzmmlxcb64veq

Another Look at Tightness II: Practical Issues in Cryptography [chapter]

Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2017 Lecture Notes in Computer Science  
This decision was bold, but also rash, as Zaverucha's attack shows. Remark 15. A time-memory-data tradeoff can be applied to speed up the on-line portion of the attack; see Remark 7 in [27] .  ...  In preparation for the possible advent of large-scale quantum computers, standards organizations have begun examining candidates for public-key cryptosystems that withstand attacks by quantum computers  ...  We shall later give a simple attack that shows that the standard IND-CCA is deficient and should be replaced by the multi-challenge model. Remark 13.  ... 
doi:10.1007/978-3-319-61273-7_3 fatcat:auyw65hh2rfh3k3hphhrf6mcra

Page 2761 of Mathematical Reviews Vol. , Issue Subject Index [page]

Mathematical Reviews  
(English summary) (see 2002k:94031) Biryukov, Alex (with Shamir, Adi) Cryptanalytic time/memory/data tradeoffs for stream ciphers. (English summary) 2002h:94045 Blake, lan F.  ...  ., 2002e:11016 Grassl, Markus (with Beth, Thomas) Cyclic quantum error-correcting codes and quantum shift registers.  ... 

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
In order to cater for resource-constrained applications (such as Internet of things (IoT)), small-state lightweight stream ciphers are proposed aiming at resisting the time-memory-data tradeoff (TMDTO)  ...  Time-memory tradeoff attack can be seen as a tradeoff exhaustive search that has two phases: in the preprocessing phase, one explores the general structure of the cryptosystem, and summarize the findings  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm